A guide to kernel exploitation attacking the core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical tech...

Descripción completa

Detalles Bibliográficos
Autor principal: Perla, Enrico (-)
Otros Autores: Massimiliano, Oldani, Speake, Graham
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress c2010.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628271106719
Tabla de Contenidos:
  • CONTENTS; Foreword; Preface; Acknowledgments; About the Authors; About the Technical Editor; PART I: A JOURNEY TO KERNEL LAND; CHAPTER 1 From User-Land to Kernel-Land Attacks; CHAPTER 2 A Taxonomy of Kernel Vulnerabilities; CHAPTER 3 Stairway to Successful Kernel Exploitation; PART II: THE UNIX FAMILY, MAC OS X, AND WINDOWS; CHAPTER 4 The UNIX Family; CHAPTER 5 Mac OS X; CHAPTER 6 Windows; PART III: REMOTE KERNEL EXPLOITATION; CHAPTER 7 Facing the Challenges of RemoteKernel Exploitation; CHAPTER 8 Putting It All Together: A Linux Case Study; PART IV: FINAL WORDS
  • CHAPTER 9 Kernel Evolution: Future Forms of Attackand DefenseIndex